informa
/

Security Monitoring

What Does It Take to Secure Containers?
A vast majority of DevOps practitioners say containerization technology provides security, but some companies — especial...
July 22, 2021
A vast majority of DevOps practitioners say containerization technology provides security, but some companies — especial...
by Robert Lemos, Contributing Writer
July 22, 2021
5 min read
Article
Cybersecurity Through the Lens of COVID
Whether you're talking about pandemics or cybersecurity attacks, public health and information security can use the same...
July 21, 2021
Whether you're talking about pandemics or cybersecurity attacks, public health and information security can use the same...
by Greg Bell, Co-founder & Chief Strategy Officer, Corelight
July 21, 2021
4 min read
Article
Name That Toon: Buzzard Bestie
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
July 20, 2021
Feeling creative? Come up with a clever caption for this month's contest, and our panel of experts will reward the winne...
by John Klossner, Cartoonist
July 20, 2021
1 min read
Article
Enterprises Altering Their Supply Chain Defenses on Heels of Latest Breaches
More than half of enterprises surveyed for Dark Reading's State of Malware Threats report indicate they are making at le...
July 13, 2021
More than half of enterprises surveyed for Dark Reading's State of Malware Threats report indicate they are making at le...
by Edge Editors, Dark Reading
July 13, 2021
1 min read
Article
The Trouble With Automated Cybersecurity Defenses
While there's enormous promise in AI-powered tools and machine learning, they are very much a double-edged sword.
July 13, 2021
While there's enormous promise in AI-powered tools and machine learning, they are very much a double-edged sword.
by Steve Durbin, CEO of the Information Security Forum
July 13, 2021
4 min read
Article
Tool Sprawl & False Positives Hold Security Teams Back
Security teams spend as much time addressing false positive alerts as they do addressing actual cyberattacks, survey dat...
July 12, 2021
Security teams spend as much time addressing false positive alerts as they do addressing actual cyberattacks, survey dat...
by Kelly Sheridan, Senior Editor
July 12, 2021
5 min read
Article
SOC Investment Improves Detection and Response Times, Data Shows
A survey of IT and security pros finds many are confident in their ability to detect security incidents in near-real tim...
July 02, 2021
A survey of IT and security pros finds many are confident in their ability to detect security incidents in near-real tim...
by Dark Reading Staff, Dark Reading
July 02, 2021
2 min read
Article
New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies
Researchers found a "novel" class of DNS vulnerabilities in AWS Route53 and other DNS-as-a-service offerings that leak s...
June 23, 2021
Researchers found a "novel" class of DNS vulnerabilities in AWS Route53 and other DNS-as-a-service offerings that leak s...
by Kelly Jackson Higgins, Executive Editor
June 23, 2021
6 min read
Article
Cyber Is the New Cold War & AI Is the Arms Race
Continual cyberattacks have pushed us into a new kind of Cold War, with artificial intelligence the basis of this new ar...
June 10, 2021
Continual cyberattacks have pushed us into a new kind of Cold War, with artificial intelligence the basis of this new ar...
by Nancy Grady, Chief Data Scientist & Solutions Architect
June 10, 2021
4 min read
Article
Modern SOCs a 'Painful' Challenge Amid Growing Complexity: Report
A new study examines the tools and technologies driving investment and activities for security operations centers.
May 28, 2021
A new study examines the tools and technologies driving investment and activities for security operations centers.
by Dark Reading Staff, Dark Reading
May 28, 2021
1 min read
Article
Devo: SIEM Continues to Evolve with Tech Trends and Emerging Threats
SPONSORED: WATCH NOW -- Some organizations split the difference with a hybrid of premises- and cloud-based SIEM, says Te...
May 26, 2021
SPONSORED: WATCH NOW -- Some organizations split the difference with a hybrid of premises- and cloud-based SIEM, says Te...
by Terry Sweeney, Contributing Editor
May 26, 2021
1 min read
Article
Rise in Opportunistic Hacks and Info-Sharing Imperil Industrial Networks
Security researchers at Mandiant have seen an increasing wave of relatively simplistic attacks involving ICS systems - a...
May 25, 2021
Security researchers at Mandiant have seen an increasing wave of relatively simplistic attacks involving ICS systems - a...
by Kelly Jackson Higgins, Executive Editor
May 25, 2021
7 min read
Article
Businesses Boost Security Budgets. Where Will the Money Go?
Most organizations plan to spend more on security, leaders say in a report that explores their toughest challenges, post...
May 25, 2021
Most organizations plan to spend more on security, leaders say in a report that explores their toughest challenges, post...
by Kelly Sheridan, Senior Editor
May 25, 2021
5 min read
Article
Cloud Security Blind Spots: Where They Are and How to Protect Them
Security experts discuss oft-neglected areas of cloud security and offer guidance to businesses working to strengthen th...
May 21, 2021
Security experts discuss oft-neglected areas of cloud security and offer guidance to businesses working to strengthen th...
by Kelly Sheridan, Senior Editor
May 21, 2021
9 min read
Article
Lack of Skills, Maturity Hamper Threat Hunting at Many Organizations
When implemented correctly, threat hunting can help organizations stay head of threats, researcher says at RSA Conferenc...
May 20, 2021
When implemented correctly, threat hunting can help organizations stay head of threats, researcher says at RSA Conferenc...
by:
May 20, 2021
5 min read
Article